Page 1 / 2   >   >>
Malware Explained: Packer, Crypter & Protector
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
These three techniques can protect malware from analysis. Heres how they work.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 3/22/2017
Comment0 comments  |  Read  |  Post a Comment
7 Things You Need to Know about Bayesian Spam Filtering
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
Knowing how spam filters work can clarify how some messages get through, and how your own emails can avoid being caught.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 3/14/2017
Comment0 comments  |  Read  |  Post a Comment
4 Ways to Recover from a Cyberattack
Malwarebytes Labs, Malwarebytes LabsCommentary
Be prepared and act quickly are two key steps that will help you bounce back quickly from a cyberattack.
By Malwarebytes Labs Malwarebytes Labs, 3/8/2017
Comment0 comments  |  Read  |  Post a Comment
Adware vs. Ad Fraud: Viva la Difference!
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
Both earn their money in the advertising trade but they each have very different means of operation and targets.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 3/6/2017
Comment0 comments  |  Read  |  Post a Comment
DNSSEC: Why Do We Need It?
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
The number of signed domain names has grown considerably over the past two and a half years but some sectors are heavily lagging behind.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 3/1/2017
Comment1 Comment  |  Read  |  Post a Comment
Mac Malware Reaches New Highs
Thomas Reed, Director of Mac Offerings, MalwarebytesCommentary
Two new malware threats in a week this past month, plus others in January, brings the 2017 Mac malware count up to 6 and growing.
By Thomas Reed Director of Mac Offerings, Malwarebytes, 2/28/2017
Comment0 comments  |  Read  |  Post a Comment
Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
Malwarebytes Labs, Malwarebytes LabsCommentary
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.
By Malwarebytes Labs Malwarebytes Labs, 1/24/2017
Comment0 comments  |  Read  |  Post a Comment
Threat Attribution: Misunderstood & Abused
Malwarebytes Labs, Malwarebytes LabsCommentary
Despite its many pitfalls, threat attribution remains an important part of any incident response plan. Heres why.
By Malwarebytes Labs Malwarebytes Labs, 1/18/2017
Comment0 comments  |  Read  |  Post a Comment
Understanding The Basics Of Two-Factor Authentication
Malwarebytes Labs, Malwarebytes LabsCommentary
With data breaches resulting in leaked passwords occurring almost daily, two-factor authentication has become an essential tool in the security toolkit.
By Malwarebytes Labs Malwarebytes Labs, 1/16/2017
Comment2 comments  |  Read  |  Post a Comment
Operational Security Best Practices For Social Media
Malwarebytes Labs, Malwarebytes LabsCommentary
Building a firm, clear policy on disclosures online can provide a flexible, adaptive response that will protect proprietary data from winding up in a public leak.
By Malwarebytes Labs Malwarebytes Labs, 1/11/2017
Comment0 comments  |  Read  |  Post a Comment
Online Or Offline, Ransomware Will Find You
Malwarebytes Labs, Malwarebytes LabsCommentary
The current threat landscape is a mish-mash of online ransomware, offline ransomware, and those that are a mixture of the two.
By Malwarebytes Labs Malwarebytes Labs, 1/9/2017
Comment0 comments  |  Read  |  Post a Comment
Explained: Domain-Generating Algorithms
Malwarebytes Labs, Malwarebytes LabsCommentary
Cybercriminals use domain-generating algorithms to prevent their servers from being blacklisted or taken down.
By Malwarebytes Labs Malwarebytes Labs, 12/21/2016
Comment0 comments  |  Read  |  Post a Comment
Phishing Can Leverage Users To Bypass Sandboxes
Malwarebytes Labs, Malwarebytes LabsCommentary
Using social engineering to bypass traditional security defenses is not new and will certainly continue to grow.
By Malwarebytes Labs Malwarebytes Labs, 12/19/2016
Comment0 comments  |  Read  |  Post a Comment
Security In 2017: Ransomware Will Remain King
Malwarebytes Labs, Malwarebytes LabsCommentary
Businesses, consumers, and security professionals must face this reality and take the necessary steps to educate each other and protect their networks.
By Malwarebytes Labs Malwarebytes Labs, 12/13/2016
Comment0 comments  |  Read  |  Post a Comment
Survey Stresses Importance Of Securing The Internet of Things
Malwarebytes Labs, Malwarebytes LabsCommentary
If organizations monitor and deploy IoT devices with caution, they can stay ahead of the curve and continue to keep all of their endpoints protected.
By Malwarebytes Labs Malwarebytes Labs, 12/7/2016
Comment2 comments  |  Read  |  Post a Comment
5 Links Of The Attack Chain And How To Disrupt Them
Malwarebytes Labs, Malwarebytes LabsCommentary
By identifying steps in the attack chain, you can deploy appropriate defenses at each stage to prevent breaches from happening in the first place.
By Malwarebytes Labs Malwarebytes Labs, 11/28/2016
Comment1 Comment  |  Read  |  Post a Comment
Active Defense Framework Can Help Businesses Defend Against Cyberattacks
Malwarebytes Labs, Malwarebytes LabsCommentary
New report provides a framework that lets private sector entities defend themselves while at the same time protect individual liberties and privacy, and mitigate the risk of collateral damage.
By Malwarebytes Labs Malwarebytes Labs, 11/17/2016
Comment0 comments  |  Read  |  Post a Comment
8 Ways Businesses Can Better Secure Their Remote Workers
Malwarebytes Labs, Malwarebytes LabsCommentary
Remote workers may present challenges for IT staff, but a combination of cybersecurity best practices, strong policy, and a dedicated user awareness campaign could keep company data safe.
By Malwarebytes Labs Malwarebytes Labs, 11/14/2016
Comment0 comments  |  Read  |  Post a Comment
Ransomware Doesnt Have To Mean Game Over
Malwarebytes Labs, Malwarebytes LabsCommentary
3 methods can help you recover from a ransomware attack relatively unscathed.
By Malwarebytes Labs Malwarebytes Labs, 11/8/2016
Comment0 comments  |  Read  |  Post a Comment
Phishing Threat Continues To Loom Large
Malwarebytes Labs, Malwarebytes LabsCommentary
Phishing and spear phishing will only get worse unless companies proactively train employees to recognize a scam when they see one.
By Malwarebytes Labs Malwarebytes Labs, 11/2/2016
Comment0 comments  |  Read  |  Post a Comment
Page 1 / 2   >   >>
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Malwarebytes protects businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the companys flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. For more information, please visit us at www.malwarebytes.com/business.
Featured Writers
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.